Banking systems fraud and technology approach, Strategic Management

Banking Systems Fraud and Technology Approach

It is my intention to use the Banking Systems in Nigeria for this case study. I have observed that the process of banking operations in Nigeria is very porous and with little technological advancement so the verification of customers' transaction is difficult. These transaction verifications include signature authentication, balance inquiry and facial recognition.

Banking systems can be compromised if certain confidential information finds its way into the hands of fraudsters. Such information can be in form of

(i)  Personal data for example national identification number and address

(ii)  Banking data for example account details and electronic card pin number.

Conventional knowledge-based methods do not really provide positive personal recognition because they rely on surrogate representations of the person's identity (e.g exclusive knowledge or possession) (Jain A.K, 2004). However, biometrics-based methods provide several advantages over these authentication methods because of its true and precise representation of a person's identity, which is very useful and effective in securing personal and banking data.

The use of biometrics, for instance fingerprints, can be used to verify withdrawals of cash over the counter in banking halls or online. This technology commonly called cryptology registers a customer's fingerprint and prevents someone else from accessing the account. Another approach is to verify the signature of a customer and determine if the handwriting is that of a registered customer in the case of a cheque.

Another useful aspect of biometrics is voice testing which can be applied in the verification of online banking transactions.

Posted Date: 2/20/2013 2:22:02 AM | Location : United States







Related Discussions:- Banking systems fraud and technology approach, Assignment Help, Ask Question on Banking systems fraud and technology approach, Get Answer, Expert's Help, Banking systems fraud and technology approach Discussions

Write discussion on Banking systems fraud and technology approach
Your posts are moderated
Related Questions
To be effective in hazard control programme it must be planned and should be logical. Programme objectives and safety policies need to be established. Responsibility to th

Product flows,  information flows, service flows participants' roles

.” Differentiate between corporate mission and strategic vision by taking corporate illustrations

The following table shows present trips between three zones and the predicted total trips in 10 years. Distribute the predicted trips using the average factor method. Stop with two

Current traffic pattern given as below.                                                 ZONE DESTINATION ZONE ORIGIN 1 2 3

A fence enclosure consists of a rectangle of length L and width 2 R , and a semicircle of radius R , as shown in Figure 1. The enclosure is to be built to have an area of 1600 m

I need a five year plan with cost estimates and a time line also net present values at 10% discount rate

what strategic alternatives followed by Tangy spices ltd?

do all organisations need strategic plan/ and what are the characteristics of good strategic plan

(a) XUZ Company produces readymade garments for men. The purchasing officer collects the following information:-               Annual demand for Jeans                      40,0